What represents user accounts in Windows security? 4. What process manages logging in? When you attempt to access a file, what does the LSA compare your access token

14. What is the primary mechanism for controlling the configuration of client

computers in Windows? 15. Can more than one group policy be applied to a single machine? 16. Does share security work on FAT file system shares? Answers 1. Mandatory user logon is the foundation of security in Windows.

2. The local computer accounts are stored in the registry.

3. Security Identifiers SIDs represent user accounts.

4. The WinLogon process manages the login process.

5. Kerberos is used to authenticate user accounts in Windows 2000 domains.

6. The user’s identity is passed to running programs by the inheritance of the access token

from the launching program.

7. The LSA compares your access token to the object’s security descriptor Access Control

List in order to determine whether or not you should have access.

8. An object’s owner has the right to change the object’s permissions irrespective of a user’s

permissions to the object. 9. The System Access Control List is used too audit various types of access to an object. 10. Rights affect many or all objects, whereas permissions are specific to each object.

11. Inheritance refers to objects receiving of a copy of the containing folder’s ACL when they

are created.

12. User accounts are stored in the Active Directory.

13. Yes. In Kerberos, trusts transit domain relationships. 14. Group policy is the primary mechanism for controlling the configuration of client computers in Windows.

15. Yes. Early policy changes are overwritten by later policy changes when multiple policies

are applied.

16. Yes. Share security works on FAT file system shares.

Terms to Know • Access Control Entry ACE • access token • Active Directory • computer accounts • computer policy • deny ACE • Directory Services Agent DSA • Discretionary Access Control List DACL • domain • group policy • inherit • Kerberos • Key Distribution Center KDC • Local Security Authority LSA • Locally Unique Identifier LUID • logon prompt • No Access permission • New Technology File System NTFS • New Technology LAN Manager NTLM • objects • owner • parent • permission • process • registry • Security Accounts Manager SAM • Security Descriptor • Security Group • Security Identifier SID • security principle • shares • System Access Control List SACL • Ticket • user account • user policy • user rights • Windows Explorer

Chapter 11: Securing Unix Servers

The security mechanisms available in standard UNIX that being ATT System V version 4, which essentially match those of BSD, are significantly simpler than those in Windows. Unix was originally developed as a “security simplified” alternative to Multics—as such, security is mostly an afterthought designed more to prevent accidental harm by legitimate users than to keep hackers at bay. Microsoft specifically designed the NT kernel to allow for much more expressive configuration of security than Unix in order to out-compete it. But complexity doesn’t equal security—in fact, in most situations, complexity is anathema to security. And, the default configuration of Windows after an installation bypasses most of Windows’ sophisticated security mechanisms anyway, whereas Unix security is usually considerably stricter than Windows security out-of-the-box. In practice, Unix security can be configured similarly to Windows despite its inherent simplicity. A Brief History of Unix To understand Unix security, it’s important to understand why Unix was developed and how it evolved. In the mid 1960’s, GE, MIT, and ATT Bell Labs began development of an operating system that was supposed to become the standard operating system for the U.S. government. This system was called Multics, and its primary purpose was to support multiple users, multiple running programs, and multiple security levels simultaneously. Multics